We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics

    Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...

    Yevhenii Shudrenko, Andreas Timm-Giel in Computing
    Article Open access 02 July 2024
  2. End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks

    Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...

    Gourav Prateek Sharma, Wouter Tavernier, ... Ingrid Moerman in Journal of Network and Systems Management
    Article Open access 08 July 2024
  3. Inference serving with end-to-end latency SLOs over dynamic edge networks

    While high accuracy is of paramount importance for deep learning (DL) inference, serving inference requests on time is equally critical but has not...

    Vinod Nigade, Pablo Bauszat, ... Lin Wang in Real-Time Systems
    Article Open access 06 February 2024
  4. CAM R-CNN: End-to-End Object Detection with Class Activation Maps

    Class activation maps (CAMs) have been widely used on weakly-supervised object localization, which generate attention maps for specific categories in...

    Shengchuan Zhang, Songlin Yu, ... Liujuan Cao in Neural Processing Letters
    Article 05 July 2023
  5. End-to-End Entity Detection with Proposer and Regressor

    Named entity recognition is a traditional task in natural language processing. In particular, nested entity recognition receives extensive attention...

    Xueru Wen, Changjiang Zhou, ... Yu Jiang in Neural Processing Letters
    Article 13 April 2023
  6. \(\text {Muckle}+\) : End-to-End Hybrid Authenticated Key Exchanges

    End-to-end authenticity in public networks plays a significant role. Namely, without authenticity, the adversary might be able to retrieve even...
    Sonja Bruckner, Sebastian Ramacher, Christoph Striecks in Post-Quantum Cryptography
    Conference paper 2023
  7. End-to-End Object-Level Contrastive Pretraining for Detection via Semantic-Aware Localization

    Pretraining on a large dataset is the first stage of many computer vision tasks such as classification, detection, and segmentation. A conventional...
    Long Geng, **aoming Huang in Artificial Intelligence
    Conference paper 2024
  8. Visual Information Extraction in the Wild: Practical Dataset and End-to-End Solution

    Visual information extraction (VIE), which aims to simultaneously perform OCR and information extraction in a unified framework, has drawn increasing...
    Jianfeng Kuang, Wei Hua, ... **ang Bai in Document Analysis and Recognition - ICDAR 2023
    Conference paper 2023
  9. Shifted Chunk Encoder for Transformer Based Streaming End-to-End ASR

    Currently, there are mainly three kinds of Transformer encoder based streaming End to End (E2E) Automatic Speech Recognition (ASR) approaches, namely...
    Fangyuan Wang, Bo Xu in Neural Information Processing
    Conference paper 2023
  10. An End-to-End Secure Solution for IoMT Data Exchange

    In the field of healthcare, the emerging concept of the Internet of Medical Things (IoMT) plays a crucial role in enhancing the efficiency of medical...
    Saad El Jaouhari, Nouredine Tamani in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  11. End-to-end acceleration of the YOLO object detection framework on FPGA-only devices

    Object detection has been revolutionized by convolutional neural networks (CNNs), but their high computational complexity and heavy data access...

    Dezheng Zhang, Aibin Wang, ... Dong Wang in Neural Computing and Applications
    Article 13 November 2023
  12. Performance optimization of autonomous driving control under end-to-end deadlines

    The rapid growth of autonomous driving in recent years has posed some new research challenges to the traditional vehicle control system. For example,...

    Yunhao Bai, Li Li, ... Junmin Wang in Real-Time Systems
    Article 27 February 2022
  13. SChain: towards the quest for redesigning supply-chain by augmenting Blockchain for end-to-end management

    The present-day supply chain exhibits multi-faceted concerns, e.g., product counterfeiting and lack of transparency and provenance support in the...

    Sidharth Quamara, Awadhesh Kumar Singh in International Journal of Information Technology
    Article 19 May 2022
  14. RESC: REfine the SCore with adaptive transformer head for end-to-end object detection

    Most detection models employ many detection heads to output their prediction results independently. However, the locality of convolutional neural...

    Honglie Wang, Rong Jiang, ... Shouqian Sun in Neural Computing and Applications
    Article 10 March 2022
  15. End-to-End Multilingual Text Recognition Based on Byte Modeling

    Nowadays, multilingual text recognition is more and more widely used in computer vision. However, in practical applications, the independent modeling...
    Jiajia Wu, Kun Zhao, ... Lirong Dai in Image and Graphics
    Conference paper 2023
  16. Incorporating Ranking Context for End-to-End BERT Re-ranking

    Ranking context has been shown crucial for the performance of learning to rank. Its use for the BERT-based re-rankers, however, has not been fully...
    **aoyang Chen, Kai Hui, ... Zheng Ye in Advances in Information Retrieval
    Conference paper 2022
  17. Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning

    In 2019, ANSSI released a protected software implementation of AES running on an STM32 platform with ARM Cortex-M architecture, publicly available on...

    Loïc Masure, Rémi Strullu in Journal of Cryptographic Engineering
    Article 10 March 2023
  18. End-to-End Multi-Slice-to-Volume Concurrent Registration and Multimodal Generation

    For interventional procedures, a real-time map** between treatment guidance images and planning data is challenging yet essential for successful...
    Amaury Leroy, Marvin Lerousseau, ... Eric Deutsch in Medical Image Computing and Computer Assisted Intervention – MICCAI 2022
    Conference paper 2022
  19. End-to-End Single Shot Detector Using Graph-Based Learnable Duplicate Removal

    Non-Maximum Suppression (NMS) is widely used to remove duplicates in object detection. In strong disagreement with the deep learning paradigm, NMS...
    Shuxiao Ding, Eike Rehder, ... Jürgen Gall in Pattern Recognition
    Conference paper 2022
  20. An In-Depth Measurement Analysis of 5G mmWave PHY Latency and Its Impact on End-to-End Delay

    5G aims to offer not only significantly higher throughput than previous generations of cellular networks, but also promises millisecond (ms) and...
    Rostand A. K. Fezeu, Eman Ramadan, ... Myung** Lee in Passive and Active Measurement
    Conference paper 2023
Did you find what you were looking for? Share feedback.